AUD Library Catalog

Image from Google Jackets
Normal view MARC view

The backup book : disaster recovery from desktop to data center / Dorian Cougias, E.L. Heiberger, Karsten Koop ; Laurie O'Connell, ed. ; foreword by David Bell ; industry forewords by Adam R. Dell, Jim Simmons, and Gary Cotshott.

By: Contributor(s): Series: Network frontiers field manual seriesPublication details: Lecanto, FL : SV Books, c2003.Edition: 3rd edDescription: xxx, 754 p. : ill. ; 23 cmISBN:
  • 0972903909 (pbk.) :
Subject(s): LOC classification:
  • QA76.9.D348 C68 2003
Contents:
What's a disaster without a recovery? -- Creating a balance for when bad things happen -- Security is job 1 ... -- When bad things happen to good computers -- From macro to micro--a quick look at the stability of assets -- Freezes, corruption, and loss--that which can go wrong -- Putting it into perspective -- Cost justifying your backup plan -- Types of calculations -- Business continuity when data loss occurs = re-creation costs -- Downtime for an individual is much different than downtime for a workgroup -- Commerce systems loss = sales net profit losses -- When timing is everything, costs are associated with the event -- Sometimes, it's simply cheaper to do things with a computer -- Protection for application freezes -- Freeze loss prevention--sort of -- Protection for computer freezes -- Document corruption -- Word (and other stand-alone documents) file corruption -- Entry-level database corruption -- Outlook and Entourage e-mail clients corruption -- Application & operating system corruption -- Repairing your Windows operating system -- Can you stop application and OS corruption? -- Storage corruption -- Storage formats and storage corruption -- Fragmentation may not be corruption ... -- Hard drive interfaces--differences between SCSI and EIDE/ATA -- SMART precludes DUMB ... -- Network corruption -- How does my Ethernet work? -- First stop on the corruption express: your cabling -- The computer's-eye view of your network -- Trouble spots on the Local Area Network -- Searching out latency and throughput trouble spots -- The REAL root cause of all network problems? -- Keeping the alligators out of the sewer -- "I'm going to ignore this chapter because I have a firewall" -- Testing (scanning) your network -- Protection: Set up an intrusion detection system (IDS) -- Assign responsibilities & create your team -- Responding to a hacker attack or other security breach -- A security checklist for bringing a new system online -- Setting up an e-mail defense system -- DNS security -- Security research sites -- Documents that don't die -- Fault tolerance = Bringing files back from "gone" -- File and directory duplication and replication -- What's a backup? -- The basics of internet backup services -- An overview of backup tool operations -- Backup media -- Open file backup for databases -- That which you can't do nuttin about: In-use or locked files -- Open-file database backups -- Recovering from operating system and application loss -- Restoration and Emergency Recovery Disks -- Disk imaging--understanding imaging basics -- Home User/Small business disk imaging options -- Larger organizations & network booting -- Larger organizations & network installs & imaging -- VERITAS Bare Metal Restore (BMR) -- Personality migration as a part of imaging -- Hardware loss -- Understanding your drives from a business continuity perspective -- Protection against drive loss = RAID -- Planning a RAID system to combat drive and server failure -- Internal RAID setups -- What about external storage? -- Storage Area Networks -- Network Attached Storage (NAS) -- What if you can't afford a clustered server or a SAN? -- Keyboard loss -- Replication -- Current, or simply consistent data? -- The tools -- Uses for IP-based replication -- Dealing with power loss -- The Main Thing -- Talk the talk--The language of power problems and UPSes -- Which UPS is for you? -- Doing it for real -- Questions you should ask -- High-availability networks -- A high-availability quiz -- The four rules of thumb for highly available networks -- E-mail that doesn't go down -- Adding a VPN for disaster preparation -- Building loss doesn't mean business loss -- What goes to offsite storage -- Pre-planning offsite computers for information availability -- Normalizing access to your systems while hunting for new digs -- Tape rotation methods -- Organizational network backups -- Backing up your servers starts with understanding them -- Setting up multiple backup servers and windowed schedules -- Finding the important data--what's your strategy? -- Creating specific selectors in your backup software to eliminate cruft -- Working with SRM (Storage Resource Management) software to eliminate cruft and reduce hardware needs -- What about workstations?.
Summary: Detailing what can go wrong in backup and recovery and how that applies to the various backup methods available, this book couples that information with recovery and business continuity tactics played out over the backdrop of various real-world scenarios.
Holdings
Item type Current library Home library Shelving location Call number Status Date due Barcode
Books Books American University in Dubai American University in Dubai Main Collection QA 76.9 .D348 C68 2003 (Browse shelf(Opens below)) Available 648188

Includes index.

What's a disaster without a recovery? -- Creating a balance for when bad things happen -- Security is job 1 ... -- When bad things happen to good computers -- From macro to micro--a quick look at the stability of assets -- Freezes, corruption, and loss--that which can go wrong -- Putting it into perspective -- Cost justifying your backup plan -- Types of calculations -- Business continuity when data loss occurs = re-creation costs -- Downtime for an individual is much different than downtime for a workgroup -- Commerce systems loss = sales net profit losses -- When timing is everything, costs are associated with the event -- Sometimes, it's simply cheaper to do things with a computer -- Protection for application freezes -- Freeze loss prevention--sort of -- Protection for computer freezes -- Document corruption -- Word (and other stand-alone documents) file corruption -- Entry-level database corruption -- Outlook and Entourage e-mail clients corruption -- Application & operating system corruption -- Repairing your Windows operating system -- Can you stop application and OS corruption? -- Storage corruption -- Storage formats and storage corruption -- Fragmentation may not be corruption ... -- Hard drive interfaces--differences between SCSI and EIDE/ATA -- SMART precludes DUMB ... -- Network corruption -- How does my Ethernet work? -- First stop on the corruption express: your cabling -- The computer's-eye view of your network -- Trouble spots on the Local Area Network -- Searching out latency and throughput trouble spots -- The REAL root cause of all network problems? -- Keeping the alligators out of the sewer -- "I'm going to ignore this chapter because I have a firewall" -- Testing (scanning) your network -- Protection: Set up an intrusion detection system (IDS) -- Assign responsibilities & create your team -- Responding to a hacker attack or other security breach -- A security checklist for bringing a new system online -- Setting up an e-mail defense system -- DNS security -- Security research sites -- Documents that don't die -- Fault tolerance = Bringing files back from "gone" -- File and directory duplication and replication -- What's a backup? -- The basics of internet backup services -- An overview of backup tool operations -- Backup media -- Open file backup for databases -- That which you can't do nuttin about: In-use or locked files -- Open-file database backups -- Recovering from operating system and application loss -- Restoration and Emergency Recovery Disks -- Disk imaging--understanding imaging basics -- Home User/Small business disk imaging options -- Larger organizations & network booting -- Larger organizations & network installs & imaging -- VERITAS Bare Metal Restore (BMR) -- Personality migration as a part of imaging -- Hardware loss -- Understanding your drives from a business continuity perspective -- Protection against drive loss = RAID -- Planning a RAID system to combat drive and server failure -- Internal RAID setups -- What about external storage? -- Storage Area Networks -- Network Attached Storage (NAS) -- What if you can't afford a clustered server or a SAN? -- Keyboard loss -- Replication -- Current, or simply consistent data? -- The tools -- Uses for IP-based replication -- Dealing with power loss -- The Main Thing -- Talk the talk--The language of power problems and UPSes -- Which UPS is for you? -- Doing it for real -- Questions you should ask -- High-availability networks -- A high-availability quiz -- The four rules of thumb for highly available networks -- E-mail that doesn't go down -- Adding a VPN for disaster preparation -- Building loss doesn't mean business loss -- What goes to offsite storage -- Pre-planning offsite computers for information availability -- Normalizing access to your systems while hunting for new digs -- Tape rotation methods -- Organizational network backups -- Backing up your servers starts with understanding them -- Setting up multiple backup servers and windowed schedules -- Finding the important data--what's your strategy? -- Creating specific selectors in your backup software to eliminate cruft -- Working with SRM (Storage Resource Management) software to eliminate cruft and reduce hardware needs -- What about workstations?.

Detailing what can go wrong in backup and recovery and how that applies to the various backup methods available, this book couples that information with recovery and business continuity tactics played out over the backdrop of various real-world scenarios.

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions